We actively support the following versions with security updates:
| Version | Supported | End of Life |
|---|---|---|
| 2.0.x | ✅ | TBD |
| 1.0.x | ❌ | 2025-10-18 |
Please do not report security vulnerabilities through public GitHub issues.
- Email: Send details to
security@devicefingerprinting.dev - Subject Line: Use "[SECURITY] Brief description"
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if available)
- Your contact information
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 7 days
- Status Updates: Every 7 days until resolved
- Fix Timeline: Critical issues within 14 days, others within 30 days
- Public Disclosure: After fix is released and users have time to update
We follow responsible disclosure principles:
- Report privately first
- Give us time to fix the issue (typically 90 days)
- Coordinate disclosure with our team
- Credit will be given in the security advisory
Our library implements multiple security layers:
- ✅ Post-quantum cryptography (Dilithium3)
- ✅ Hybrid classical + PQC signatures
- ✅ SHA3-256/SHA3-512 hashing
- ✅ PBKDF2 key derivation
- ✅ Constant-time operations
- ✅ Timing attack protection
- ✅ Cache poisoning prevention
- ✅ Anti-replay protection with nonces
- ✅ Command injection prevention
- ✅ Input validation and sanitization
- ✅ Admin authentication with session tokens
- ✅ Rate limiting with exponential backoff
- ✅ Secure key storage
- ✅ Monotonic counter operations
- Keep Updated: Always use the latest version
- Secure Storage: Protect key files with proper permissions
- Admin Passwords: Use strong, unique admin passwords
- Rate Limiting: Enable anti-replay protection in production
- Logging: Monitor logs for suspicious activity
- Network: Use HTTPS for nonce/signature transmission
- Last Audit: October 2025
- Next Scheduled: January 2026
- Audit Report: Available on request for enterprise customers
-
PQC Backend: Currently uses classical fallback (PqcBackend.NONE)
- Impact: Strong classical crypto, but not quantum-resistant yet
- Mitigation: Install native PQC backend (cpp-pqc, rust-pqc, python-oqs)
- Timeline: Full PQC support with native backends
-
Server Nonce Verification: Known issue in v2.0.0
- Impact: Nonce verification returns False in some scenarios
- Mitigation: Disable anti-replay for testing, fix in progress
- Timeline: Fix scheduled for v2.0.1
We welcome security researchers and offer:
- 🏆 Hall of Fame: Public recognition
- 💰 Bounty Program: Rewards for critical vulnerabilities
- 🎓 Learning: Feedback and guidance
- Security Email: security@devicefingerprinting.dev
- GPG Key: Download
- Response Time: 24-48 hours
- Preferred Language: English
Subscribe to security advisories:
- GitHub: Watch repository for security alerts
- Email: Subscribe at https://devicefingerprinting.dev/security
- RSS: https://github.com/Johnsonajibi/DeviceFingerprinting/security/advisories.atom
Thank you for helping keep Device Fingerprinting Library and its users safe!